סייבר ואבטחת מידע

Network Forensics

מספר הקורס 71586

40 שעות
5 מפגשים
* מספר המפגשים והשעות למפגש עשויים להשתנות בין קורס לקורס

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים:

ספרו לי עוד


Network forensics training is about the analysis of network traffic to identify intrusions or anomalous activity. Compared to computer forensics, where evidence is usually preserved on disk, network data is more volatile and unpredictable and therefore requires a different approach. This course sets the groundwork of understanding networks and the investigation process on them. Students will master the fundamentals of conducting forensic analysis in a network environment. This course will incorporate demonstrations and lab exercises to reinforce hands-on capabilities.

The course helps prepare for the certification exam CNFE (Mile2).


On Completion, Delegates will be able to

Detect various types of computer and network incidents

Analyze network artifacts left on a compromised system

Understand alerts and advisories

Respond to incidents

Perform network traffic monitoring and analyzing logs

Learn to work with different tools


Who Should Attend

Law enforcement officers & intelligence corps

Incident responders

Computer investigators

IT/network administrators

IT security personnel

Junior cyber forensics analysts


תכנית הלימודים

Full syllabus
PDF להורדה

Module 1: Network Forensics

During this module, participants will learn how to read packets of data, perform file carving, and identify suspicious activity on the network. Students will get an insight into how an attack on the network is carried out and how it can be identified. Students will be tasked with constructing essential defensive tools that will raise alerts when the system is attacked

Module 2: Case Investigation

During this module, students will understand the challenges of investigating network-based cases. Students will practice using various tools and investigation methodologies to correlate data and collect evidence

Module 3: Advanced Network Analysis

During this module, students will master techniques for collecting evidence, accessing, and retrieving volatile and non-volatile information. Students will learn techniques for collecting evidence, accessing, and retrieving volatile and non-volatile information

Module 4: Intrusion Detection and Mitigation

In this module, students will learn how to deploy automatic data analyzers, using preset rules or craft custom rule-sets to alert and block on detection of suspicious traffic


This course addresses those with basic knowledge of:

  • Linux
  • Network Research or Network Security
  • Windows Forensics
cyberium Arena - סימולטור

The courses at John Bryce Training allow you to gain experience with unique simulators and hands-on practice labs that include a variety of scenarios. Students are given the opportunity to put in practice what they have learned in order to retain all the relevant skills and information they were given throughout the course, this way upgrading their knowledge and expertise.

The simulator that is used in the hands on practice labs is The Cyberium system. This is an advanced cyber scenario simulator which has been developed by cyber experts who have been constantly involved in cyber training and in giving knowledge gaps solutions in the field of cyber. The simulator includes two main types of scenarios – educational and realistic.

Each educational scenario is focused on a different aspect of the course and simulates a specific aspect of the training topics. Each issue or topic taught in the course has a point exercise that allows the student to focus on it and deeply learn it.

The realistic scenarios simulate possible or past incidents related to Information Security. This includes everything from topics such as the Regulation of Cyber Systems to Attacks by Terrorist Hacker Organizations. These scenarios are broader than the educational exercises and require more of a systemic, strategic and comprehensive vision.

After each scenario, the system automatically generates detailed reports that serve as immediate feedback that allows the student and lecturer to measure the abilities, strengths, and weaknesses of the participant.

Schedule Appointment

Fill out the form below, and we will be in touch shortly.

לא הצלחנו לאתר את הטופס.